Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying geographical location of wide area network users

user technology, applied in the field of communication using a wide area network, can solve the problems of unable to use public access codes by another users, etc., and achieve the effect of reducing the likelihood of success in guessed access codes, reducing the possibility of misuse, and reducing the likelihood of access codes being successfully guessed

Inactive Publication Date: 2005-09-29
CRYSTAL MOUNTAIN COMM LLC
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0008] The present invention provides a method and system for quickly verifying a geographical location of a user of a wide area network. The method is particularly useful for verifying the location of users seeking to register themselves with merchants and membership organizations on a wide area network. That is, merchants and organizations may find it advantageous to employ the method prior to assigning an account to a new customer or member. Other applications may include verifying the location of members seeking to access highly protected, sensitive information via a wide area network.
[0009] According to an embodiment of the invention, the method is used to verify the location of a wide area network user connecting to the network through a network address. For example, when the wide area network is the Internet, the connection address may consist of a 12-digit Internet Protocol (IP) address. A receiving party, such as a merchant or organization, receives a request for access from the user, and records the user's network address. The user also supplies a purported location, such as a home address, to the receiving party. The receiving party then uses a signal of limited range to transmit an access code to the user. The limited-range signal is broadcast only within a limited geographical area including the area that the user purports to be in. Preferably, the broadcast area is made as small as possible without excluding the user's purported location. If the user is actually at the purported location, the user will receive the signal and the access code transmitted thereby. Otherwise, the user will not receive the access code. After receiving the access code, the user is able to use the access code to gain access to the desired wide area network merchant or other host site by transmitting the access code back to the host through the user's network connection. If the access code is received from the user's recorded network address within a short period after transmission, the host, in turn, has effectively verified that the user is located at or near the user's purported location.
[0011] The network user receives the transmitted code using a device suitable for receiving the transmitted signal. Suitable devices may include a general-purpose cellular phone or pager, television receiver, or radio receiver. For example, the code may be transmitted as a message to the user's cell phone or pager. In the alternative, the user may tune a television or cell phone to a designated frequency and receive the access code by watching or listening to a list. Because the access code will not function unless supplied through the requesting user's original network location, a public access code cannot be used by an another user. Additionally, each access code is preferably assigned a limited life or period in which the code will be accepted as valid, further reducing the possibility for misuse. To reduce the likelihood that the access code may be successfully guessed, each access code is preferably a randomly selected sequence of information of variable length.
[0012] In an embodiment of the invention, the user's reception device is a specialized receiver configured exclusively for receiving access codes. Preferably, the specialized receiver is connected directly to the user's computer or other device used for accessing the wide area network, and any access codes received are passed automatically to the code originator via the user's network connection, thereby making the verification process more convenient for the user, and more secure for the originator.
[0013] In a related embodiment, the specialized device confirms receipt of each access code by transmitting a confirmation signal back to the broadcast source or other suitably placed receiver. The confirmation, including a unique, randomly generated confirmation code, is supplied to the original host (provider of the access code). The user then supplies the confirmation code and the access code through the user's network connection, and the user is validated only if all codes match the host's records. In the alternative, or in addition, the host sets a very limited life for the access code, such as less than ten seconds, as measured from the time that a confirmation is received. The specialized receiver device is preferably configured to automatically send the access code via the network connection immediately after transmitting the confirmation. Each of these methods discourages users from subverting the method by stationing a receiver (such as one belonging to another user) in the location of a false purported location to receive an access code, and then using the access code from a connection at a different location.

Problems solved by technology

Because the access code will not function unless supplied through the requesting user's original network location, a public access code cannot be used by an another user.
Additionally, each access code is preferably assigned a limited life or period in which the code will be accepted as valid, further reducing the possibility for misuse.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying geographical location of wide area network users
  • Method for verifying geographical location of wide area network users
  • Method for verifying geographical location of wide area network users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention provides a method and system for verifying a geographical location of a user of a wide area network. The method can be quickly and cost-effectively implemented using presently available equipment, and can be implemented without requiring dedicated equipment at the client side.

[0021]FIG. 1 shows an exemplary system 100 for implementing a method according to the invention. System 100 comprises a wide area network (WAN) 102, such as the Internet, connected by communication links as known in the art to user devices 106 and 108 and to a host computer 104, which is in turn connected to a computer memory 120. Each of user devices 106, 108 may comprise any suitable client device as known in the art for connecting to the wide area network, including but not limited to a personal computer. In an embodiment of the invention, wide area network 102 is the Internet, but the invention is not limited thereto. It should be apparent that a large plurality of user devices...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recorded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verified and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed.

Description

CROSS-REFERENCE TO RELATED APPLICATION [0001] This application claims priority pursuant to 35 U.S.C. § 119(e) to U.S. Provisional Application No. 60 / 227,343, filed Aug. 23, 2000, which application is specifically incorporated herein, in its entirety, by reference.BACKGROUND OF THE INVENTION [0002] 1. Field of the Invention [0003] The present invention relates to methods for communicating using a wide area network, and particularly to a method for verifying a geographical location of a user of a wide area network. [0004] 2. Description of Related Art [0005] Wide area networks, such as the Internet, are particularly useful for facilitating communications between strangers in remote geographical locations. In recent years, this capability has led to an increasing amount of commercial and non-commercial business being transacted over wide area networks. The parties to these transactions often know little about each other except for information such as the parties voluntarily share over ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04W4/021H04W4/06H04W8/08H04W12/12H04W64/00H04W68/12H04W92/02
CPCH04M3/02H04W12/10H04M2201/50H04W4/06H04W8/08H04W8/26H04W12/12H04W48/08H04W64/00H04W68/12H04W92/02H04L63/18H04W4/021H04W88/06H04M3/42382H04W12/104
Inventor SHUSTER, GARY STEPHEN
Owner CRYSTAL MOUNTAIN COMM LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products